Tag: technology

Questions Related to technology

  1. The program should be started with root privileges. Then it should use setuid(UID) to change privileges between root and another account.

  2. The program should be started with root privileges. Then it should use seteuid(UID) to change privileges between root and another account.

  3. Starting the program as root is a security risk. The program should run with least privileges and obtain root using seteuid(UID) whenever necessary.

  4. The program has to run with root privileges entirely. Once root privileges are dropped they cannot be regained.


Correct Option: B
  1. Since the file name is hard coded, fopen() will fail if the file already exists

  2. 0600 is not a secure option. The parameter 0600 should be changed to 0666

  3. Attackers can exploit by creating a symboling link /tmp/cache_data that points to a system file

  4. Attackers can exploit the application's cache by writing directly to /tmp/cache_data


Correct Option: C
  1. Overwriting freed memory is a security vulnerability

  2. Depends on the application and how important “somedata” is

  3. This will result in a buffer overflow since the freed memory location cannot handle 8 characters of data “somedata”

  4. strcpy() will fail as it cannot write to already freed memory, and the application will crash


Correct Option: A
  1. Fiber Data Distributed Interface

  2. Fiber Distributed Data Interface

  3. Fiber Distributed Digital Interface

  4. Fiber Digital Ditributed Interface


Correct Option: B
  1. Internet Connection Messgae Protocol

  2. Internet COntrol messgae protocol

  3. Internet Control Management Protocol

  4. Internet Control Messgae Protocol


Correct Option: D
  1. Lightweight Directory Access Protocol

  2. Lightweight Data Access Protocol

  3. Lightweight Distributed Access Protocol

  4. LightWeight Access Protocol


Correct Option: A
  1. Synchronous Network Management Protocol

  2. Simple Network Management Protocol

  3. Simple Network Message Protocol

  4. Simple Network Messaging Protocol


Correct Option: B
  1. Digital Host Connection Protocol

  2. Digital Host Configuration Protocol

  3. Dynamic Host Connection Protocol

  4. Dynamic Host Configuration Protocol


Correct Option: D